Advanced Email Encryption End-User Guide TRITON® AP-EMAIL with Email Cloud Module 2016 Release 2 ©1996–2016, Forcepoint LLC All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2016 The products and/or methods of use described in this document are covered by U.S. Patent Numbers 5,983,270; 6,606,659; 6,947,985; 7,185,015; 7,194,464 and RE40,187 and other patents pending. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Forcepoint LLC. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint LLC makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint LLC shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Trademarks Forcepoint is a trademark of Forcepoint LLC. SureView, TRITON, ThreatSeeker, Sidewinder and Stonesoft are registered trademarks of Forcepoint LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks are the property of their respective owners. Microsoft, Windows, Windows Server, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Mozilla and Firefox are registered trademarks of the Mozilla Foundation in the United States and/or other countries. eDirectory and Novell Directory Services are a registered trademarks of Novell, Inc., in the U.S and other countries. Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Red Hat is a registered trademark of Red Hat, Inc., in the United States and other countries. Linux is a trademark of Linus Torvalds, in the United States and other countries. This product includes software distributed by the Apache Software Foundation (http://www.apache.org). Copyright (c) 2000. The Apache Software Foundation. All rights reserved. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. Contents Chapter 1 Advanced Email Encryption End-User Guide. . . . . . . . . . . . . . . . . . . . . . . . . . 1 Receiving secure email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 How do I open a secure message?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 How do I register for the first time? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 How do I authenticate? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 How do I recover my password?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 How do I read my secure message? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 What are signatures and what does it mean if the signature is valid or invalid? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 How do I access attachments sent to me? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Responding to secure email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 How do I reply, reply to, or forward a secure email? . . . . . . . . . . . . . . . . . . . . 5 How do I add an attachment to the secure email?. . . . . . . . . . . . . . . . . . . . . . . 6 How do I get a copy of the secure email that I send? . . . . . . . . . . . . . . . . . . . . 7 How do I know my message is sent? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 How secure are secure messages?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 How do I sign out? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 TRITON AP-EMAIL with Email Cloud Module i Contents ii TRITON AP-EMAIL with Email Cloud Module Advanced Email Encryption End-User Guide Forcepoint™ TRITON® AP-EMAIL with Email Cloud Module offers support for advanced email encryption. The Advanced Email Encryption feature encrypts email from end user to end user based on policy, protecting confidential communications with your business partners and customers. In this guide, find out what to do if you’re a first-time user, along with how to open, respond to, and forward a secure email, and other actions you can take. ● Receiving secure email, page 1 ● Responding to secure email, page 5 ● Security, page 8 Receiving secure email How do I open a secure message? You can receive a secure message in almost any email client. A secure message is received in your inbox with the encrypted attachment named message_zdm.html. TRITON AP-EMAIL with Email Cloud Module 1 Advanced Email Encryption End-User Guide To read a secure email, click the message_zdm.html attachment. Next, click the Read Message button on the page that opens in your Web browser. If you’re a first-time user, you’ll be asked to register. You’ll have to provide your name and set a password. Another email message will be sent to you to verify that you are the owner of the email address. If you are a registered user, you’ll just need to provide your password and authenticate. When the authentication process completes, the secure email will be displayed in your Web browser. Note A Microsoft Outlook plug-in is available to make it even easier to read your secure email. This plug-in can be purchased directly from Voltage.com. Simply install it, and you can access your encrypted email in your inbox, offline. How do I register for the first time? If you are a first-time user, you’ll be asked to register when you open the secure message attachment. As indicated below, registration is a simple step in order to validate that you are the owner of the email. You will provide your name, password, and a security question to complete registration. The security question is used in the password recovery procedure should you forget your password. 2 TRITON AP-EMAIL with Email Cloud Module Advanced Email Encryption End-User Guide An email will be sent to your address for you to verify your identity. Click on the link in your inbox to complete the registration process. How do I authenticate? You’ll have to provide your password in order to read your secure message. This is the password that you provided during registration. This is to validate that you are the person for whom the message is intended. Once you sign in with your password, your secure message is displayed in the browser you are using. If you forgot your password, or would like to change it, click on the link to recover it. For further information on how to recover or change your password, see How do I recover my password?. How do I recover my password? If you forgot your password, or would like to change it, click the link, Forgot your password. You’ll be prompted to answer the security question you selected during TRITON AP-EMAIL with Email Cloud Module 3 Advanced Email Encryption End-User Guide registration. If you do not know the answer, you can click the link Forgot your Answer? An email will be sent to your inbox to validate that you are the owner of the email address. You’ll be required to click the link within 2 hours, after which your password recovery request becomes void. When you click the link, you will be prompted to reset your password. How do I read my secure message? Once you have authenticated successfully, the secure message opens in your browser. Now you are able to read your message, reply, reply all, and forward the message to another email ID securely. 4 TRITON AP-EMAIL with Email Cloud Module Advanced Email Encryption End-User Guide What are signatures and what does it mean if the signature is valid or invalid? Every secure email is signed by the sender of the message to ensure authenticity of the sender and data integrity of the message. A symbol indicates that the signature associated with this email is valid and the message can be trusted. A symbol means that the signature associated with this message is not valid and the message may have been forged. We recommend that you either contact the sender of the message or your local technical support personnel. How do I access attachments sent to me? All secure attachments are contained within the message and will appear when you read the message. To open the attached files, click on the [view] button next to the attachment names - a new browser window opens to enable you to access the attachment. Responding to secure email How do I reply, reply to, or forward a secure email? To reply to or forward a secure email follow the instructions. You will be able to reply or forward securely to the intended recipients. 1. Click Reply or Reply-All, or Forward at the top of the message. TRITON AP-EMAIL with Email Cloud Module 5 Advanced Email Encryption End-User Guide All recipients are already entered in the To: field for a reply or reply-all operation. 2. Add any email addresses in the To, Cc or Bcc fields (click Show Bcc). Email addresses can be separated with commas, semicolons, or blank spaces. 3. Type your message. You can use rich text editing to compose your reply. The original message is already included in the compose field. If you are forwarding, attachments are included as well. 4. Click Send Secure to send your reply. How do I add an attachment to the secure email? You can add an attachment to your email when replying or forwarding. You can send all types of files as attachments, including word processor or spreadsheet documents, audio files, image files, Web pages saved as HTML files, and more. To add attachments to your secure email, click Choose File in the Attach field and select a file. 6 TRITON AP-EMAIL with Email Cloud Module Advanced Email Encryption End-User Guide The selected file is uploaded immediately. To remove attachments, click the Remove link. Note There is a limit of 15MB for attachments that you can add into a secure message. How do I get a copy of the secure email that I send? To get a copy of the secure email that you have composed, click Copy Me, to the right of the To field. When you send the message, an exact copy of the secure email is sent to your email account. If you do not want a copy of the secure email, click Remove Me, to the right of the To field. TRITON AP-EMAIL with Email Cloud Module 7 Advanced Email Encryption End-User Guide How do I know my message is sent? When you click the Send Secure button, you will be prompted that your message has been sent successfully: Security How secure are secure messages? The secure email is encrypted with the equivalent of a 1024-bit key. It uses the breakthrough Identity-Based Encryption to ensure the privacy of your personal data without compromising ease of use. Each message is also signed by the sender to ensure authenticity of the sender and data integrity of the message. In addition, all decrypted email messages are viewed through your Web browser using an SSL/TLS connection. 8 TRITON AP-EMAIL with Email Cloud Module Advanced Email Encryption End-User Guide How do I sign out? In order to sign out, click the Sign out link at the top right corner. You have been successfully signed out when you see the following message: TRITON AP-EMAIL with Email Cloud Module 9 Advanced Email Encryption End-User Guide 10 TRITON AP-EMAIL with Email Cloud Module